Turul - Project Introduction
ML TRAININGATLAN DIGITAL
  • Welcome to Turul
    • Overview
    • How to access Turul
  • User Interface
  • Data Management
    • Tasks
    • Credentials
  • Listener and Infrastructure Management
    • HTTPS Listener Management
    • Listener Setup
    • Redirector
  • Turul Implants
    • Implant Management
    • Turul's Implant Generation
      • Implant Setup
  • Post Exploitation
    • Beacon Management
    • Beacon
    • The Post Exploitation Module
    • Upload and Download
    • File Browser
    • Other Commands
  • Malleable Command and Control
    • Overview
    • Malleable Profiles
      • Profile Language
      • Data Transform Language
      • Options
      • Profile walkthrough
  • HTTP transaction of a Beacon
Powered by GitBook
On this page
  1. Post Exploitation

File Browser

Last updated 1 year ago

Turul's file browser offers a convenient way to browse the files on a compromised system. Go to Beacons -> [Beacon] -> File Browser.

You can refresh a folder by right-clicking on it and selecting the Refresh option.

You can download a file from the victim's computer by right-clicking on it and selecting the Download to Turul option.

You can upload a file to the victim's computer by right-clicking on a folder and selecting the Upload option.

Currently, the file browser can only be used with elevated privileges!

Opening the File Browser
Opening a folder in the File Browser
Refreshing a folder in the File Browser
Downloadinga file from the victim's computer using the File Browser
Uploading a file to the victim's computer using the File Browser